• Title/Summary/Keyword: Leakage management

Search Result 668, Processing Time 0.023 seconds

A Study on the Implementation of the Privacy Impact Assessment Management System for Enterprise (기업을 위한 개인정보영향평가 관리 시스템의 구현에 관한 연구)

  • Sun, Jae Hoon;Kim, Yong Ho
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.57-63
    • /
    • 2015
  • Development of IT technology, the rapid computerization of society has accelerated the digitization of the world's information. Then, the activation of the e-commerce is the collection of a number of sensitive information, storage, operational increased rapidly. Currently, the public sector, financial sector, the private sector has utilized a number of privacy. Accidents caused by leakage of information is a tendency to increase day by day. For a review of the problems of security and protection for such sensitive information, the need for easier support system it is required. This thesis suggests E-PIAMS(Enterprise-Privacy Impact Assessment Management System) applicable effectively in private sectors.

Development of Document Security System for KSLV-I Program (KSLV-I 문서보안시스템 개발)

  • Lee, Hyo-Young;Joh, Mi-Ok;Hong, Il-Hee
    • Aerospace Engineering and Technology
    • /
    • v.7 no.1
    • /
    • pp.210-215
    • /
    • 2008
  • Most of technology information obtained from KSLV-I program have been managed by Program Life-Cycle Management System(PLMS). As involving technologies in the program require high level of confidentiality as those may be dealt with entities in international cooperation, the enforcement of strict security policy is inevitable. Therefore, a document security system has been developed to enhance protection in document management. This paper describes the overview and development status of the security system, integrated with PLMS, which aims at preventing illegal access and inadvertant leakage of the technology information.

  • PDF

Quality Improvement to Prevent Shifting Error of Tracked Vehicles (궤도차량 변속오류 예방을 위한 품질개선)

  • Yun, Sunghyun;Baek, Hyun Moo;Park, Dong Min;Oh, Dong-Kyo
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.2
    • /
    • pp.297-313
    • /
    • 2023
  • Purpose: The purpose of this study is to investigate the causes of shifting errors reported in military tracked vehicles and to improve related quality to prevent recurrence. Methods: A systematic disassembly and inspection of the transmission is carried out and an experimental simulation is conducted to reproduce the shifting error phenomenon. Electrical characteristic tests are subsequently performed and microscopic observation is also carried out on the disassembled connector parts such as pins and fractured surfaces. Results: Oil contamination and swelling deformation are observed in the connector to the vehicle due to oil leakage of its counterpart connector to the transmission. This causes electrical contact failure between both connectors in the fastened state, and it is found that shifting error of the tracked vehicle could occur subsequently. To prevent the recurrence of this phenomenon, comprehensive quality improvement is conducted including product improvement of the wiring harness assembly and strengthening activities for quality control and preventive maintenance. Conclusion: This study is expected to be helpful as a prior case study for cause analysis and recurrence prevention in the event of similar cases in the future.

Real Estate Industry in the Era of Technology 5.0

  • Sun Ju KIM
    • The Journal of Economics, Marketing and Management
    • /
    • v.11 no.6
    • /
    • pp.9-22
    • /
    • 2023
  • Purpose: This paper aims to suggest ways to apply the leading technologies of Industry 5.0 to the housing welfare field, tasks for this, and policy implications. Research design, data, and methodology: The analysis method of this study is a literature study. The analysis steps are as follows. Technology trends and characteristics of Industry 5.0 were investigated and analyzed. The following is a method of applying technology 5.0 in the industrial field. Finally, the application areas of each technology and the challenges to be solved in the process were presented. Results: The results of the analysis are 1) the accessibility and diffusion of technology. This means that all citizens have equal access to and use of the latest technology. To this end, the appropriate use of technology and the development of a user-centered interface are needed. 2) Data protection and privacy. Residential welfare-related technologies may face risks such as personal information leakage and hacking in the process of collecting and analyzing residents' data. 3) Stability, economic feasibility, and sustainability of the technology. Conclusions: The policy implications include: 1) Enhancing technology education and promotion to improve tech accessibility for groups like the low-income, rural areas, and the elderly, 2) Strengthening security policies and regulations to safeguard resident data and mitigate hacking risks, 3) Standardization of technology, 4) Investment and support in R&D.

A Study on Integration Security Management Model in Cloud Environment (클라우드 환경에서의 통합 보안관제 모델 연구)

  • Byun, Yun Sang;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.407-415
    • /
    • 2013
  • Recently, Interest variety of IT services and computing resources are increasing. As a result, the interest in the security of cloud environments is also increasing. Cloud environment is stored that to provide services to a large amount of IT resources on the Cloud. Therefore, Cloud is integrity of the stored data and resources that such as data leakage, forgery, etc. security incidents that the ability to quickly process is required. However, the existing developed various solutions or studies without considering their cloud environment for development and research to graft in a cloud environment because it has been difficult. Therefore, we proposed wire-wireless integrated Security management Model in cloud environment.

Efficiency Analysis of Security Management System of Affiliates of Conglomerate Using DEA-SBM Model (DEA-SBM 모형을 이용한 대기업 계열사 보안관리 체계 효율성 분석)

  • Jung, Hyuk;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.341-353
    • /
    • 2022
  • Conglomerates are strengthening cooperative relations by sharing information and dispatching manpower with each other to improve the overall competitiveness and technology of the group, including affiliates, and to enhance synergy. As a result, we are making every effort to increase the level of information protection of the entire group, but information leakage accidents that bypass affiliates and partner companies continue to occur. In addition, the results of the evaluation of the security management system of affiliates conducted by the parent company and the effectiveness of the actual security level have been raised. In addition, each company has limited resources that can be put into security management, so it is time for an more efficient security management system than ever before. In this study, the efficiency of operating the security management system of affiliates of steel companies is reviewed using the DEA-SBM model, and based on the analysis results, improvement measures to improve the level of security management are suggested.

Analyzing on the cause of downstream submergence damages in rural areas with dam discharge using dam management data

  • Sung-Wook Yun;Chan Yu
    • Korean Journal of Agricultural Science
    • /
    • v.50 no.3
    • /
    • pp.373-389
    • /
    • 2023
  • The downstream submergence damages caused during the flood season in 2020, around the Yongdam-dam and five other sites, were analyzed using related dam management data. Hourly- and daily-data were collected from public national websites and to conduct various analyses, such as autocorrelation, partial-correlation, stationary test, trend test, Granger causality, Rescaled analysis, and principal statistical analysis, to find the cause of the catastrophic damages in 2020. The damage surrounding the Yongdam-dam in 2020 was confirmed to be caused by mis-management of the flood season water level. A similar pattern was found downstream of the Namgang- and Hapcheon-dams, however the damage caused via discharges from these dams in same year is uncertain. Conversely, a different pattern from that of the Yongdam-dam was seen in the areas downstream of Sumjingang- and Daecheongdams, in which the management of the flood season water level appeared appropriate and hence, the damages is assumed to have occurred via the increase in the absolute discharge amount from the dams and flood control capacity leakage of the downstream river. Because of the non-stationarity of the management data, we adapted the wavelet transform analysis to observe the behaviors of the dam management data in detail. Based on the results, an increasing trend in the discharge amount was observed from the dams after the year 2000, which may serve as a warning about similar trends in the future. Therefore, additional and continuous research on downstream safety against dam discharges is necessary.

Dynamic Sensitivity Level Measurement for Privacy Protection (개인정보보호 강화를 위한 동적 보안수준 결정)

  • Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.1
    • /
    • pp.137-150
    • /
    • 2012
  • For social demand and technological development, systematic private information management and security guidance have been enhanced; however, the issue of leakage and invasion of private information is shown in many ways. In the management of such private information, the issue of how to protect such information is one of the sensitive key elements. As a criterion to decide the management policy of each property information consisting of private information, this article suggests Dynamic-Security-Level-Measurement for property information. DSLM adopts the variable characteristics of property information as the element of measurement. By applying this method, it is possible to provide information management functions to cope with the changes of each property information security level of an individual actively. It is expected that this will improve the security of previous information management methods even more and also contribute to the improvement of security in integrated systems such as the integrated ID management system and electronic wallet.

A Study on the Efficient Operation of Self-audit in Large-scale PSM Workplace (대규모 PSM 사업장의 자체감사에 대한 효율적 운영 연구)

  • Min, Se-Hong;Kim, Seok-Won
    • Fire Science and Engineering
    • /
    • v.27 no.6
    • /
    • pp.115-121
    • /
    • 2013
  • Industrial facilities are becoming bigger and more up to date, And a kind of the hazardous material used in the industrial filed is diversified. Therefore, serious accidents such as leakage of toxic materials, fire and explosion, is continuously occurred. There is Process Safety Management (PSM) system of the several preventive systems, but it is supposed to be a limitation to ensure safety or huge PSM industrial sites where have potential to catastrophically invisible and unexpected risks because it is still being managed by instruction and inspection of authority having jurisdiction other than self-regulating management differing from the primarily aim of PSM system. To verify safety management system of work-place, supplementation of existing system is urgently required. In this study, it suggests that PSM self-audit be emphasized significantly analyzing problems of the current systems for enhancing self-audit be emphasized significantly analyzing problems of the current systems for enhancing self-control safety through efficient self-audit management and improving the existing system and improving the existing as verifying the system there of, as well as studying methods which can support institutionally.

A Study on Enterprise and Government Information Security Enhancement with Information Security Management System (정보보호관리체계를 통한 기업 및 정부 정보보안 강화 방안에 관한 연구)

  • Park, Chung-Soo;Lee, Dong-Bum;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1220-1227
    • /
    • 2011
  • According to the development of IT technology, life itself is becoming the change to Knowledge-based systems or information-based systems. However, the development of IT technology, the cyber attack techniques are improving. And DDoS a crisis occurs frequently, such as cyber terrorism has become a major data leakage. In addition, the various paths of attack from malicious code entering information in the system to work for your company for loss and damage to information assets is increasing. In this environment, the need to preserve the organization and users of information assets to perform ongoing inspections risk management processes within the organization should be established. Processes and managerial, technical, and physical systems by establishing an information security management system should be based. Also, we should be introduced information security product for protecting internal assets from the threat of malicious code incoming to inside except system and process establishment. Therefore we proposed enterprise and government information security enhancement scheme through the introduction of information security management system and information security product in this paper.